Automatic security assessment of critical cyber-infrastructures

Zahid Anwar, Ravinder Shankesi, R H Campbell

Research output: Contribution to conferencePaper

Abstract

This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We describe a network model representing the static elements of a cyberinfrastructure including devices, services, network connectivity, vulnerabilities, and access controls. The dynamic elements include workflow models of the operating procedures, processes and the state of a working power grid. We introduce a toolkit that with a little manual assistance can automatically generate these models from specifications, continuously update attributes from online event aggregators, and perform security assessment. The assessment reveals whether observed anomalies about the system could indicate possible security problems and permit dynamic ranking of alternative recovery procedures to minimize the total risk. We motivate the use of the tool-chain by showing an example scenario where the recovery procedure recommended to minimize security risk depends on the current state of system as well as the network topology.

Original languageEnglish (US)
Pages366-375
Number of pages10
DOIs
StatePublished - Oct 13 2008
Event2008 International Conference on Dependable Systems and Networks, DSN-2008 - Anchorage, AK, United States
Duration: Jun 24 2008Jun 27 2008

Other

Other2008 International Conference on Dependable Systems and Networks, DSN-2008
CountryUnited States
CityAnchorage, AK
Period6/24/086/27/08

Fingerprint

Recovery
Access control
Automation
Topology
Specifications

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Anwar, Z., Shankesi, R., & Campbell, R. H. (2008). Automatic security assessment of critical cyber-infrastructures. 366-375. Paper presented at 2008 International Conference on Dependable Systems and Networks, DSN-2008, Anchorage, AK, United States. https://doi.org/10.1109/DSN.2008.4630105

Automatic security assessment of critical cyber-infrastructures. / Anwar, Zahid; Shankesi, Ravinder; Campbell, R H.

2008. 366-375 Paper presented at 2008 International Conference on Dependable Systems and Networks, DSN-2008, Anchorage, AK, United States.

Research output: Contribution to conferencePaper

Anwar, Z, Shankesi, R & Campbell, RH 2008, 'Automatic security assessment of critical cyber-infrastructures', Paper presented at 2008 International Conference on Dependable Systems and Networks, DSN-2008, Anchorage, AK, United States, 6/24/08 - 6/27/08 pp. 366-375. https://doi.org/10.1109/DSN.2008.4630105
Anwar Z, Shankesi R, Campbell RH. Automatic security assessment of critical cyber-infrastructures. 2008. Paper presented at 2008 International Conference on Dependable Systems and Networks, DSN-2008, Anchorage, AK, United States. https://doi.org/10.1109/DSN.2008.4630105
Anwar, Zahid ; Shankesi, Ravinder ; Campbell, R H. / Automatic security assessment of critical cyber-infrastructures. Paper presented at 2008 International Conference on Dependable Systems and Networks, DSN-2008, Anchorage, AK, United States.10 p.
@conference{891a047dfd38446889773732d2522ec9,
title = "Automatic security assessment of critical cyber-infrastructures",
abstract = "This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We describe a network model representing the static elements of a cyberinfrastructure including devices, services, network connectivity, vulnerabilities, and access controls. The dynamic elements include workflow models of the operating procedures, processes and the state of a working power grid. We introduce a toolkit that with a little manual assistance can automatically generate these models from specifications, continuously update attributes from online event aggregators, and perform security assessment. The assessment reveals whether observed anomalies about the system could indicate possible security problems and permit dynamic ranking of alternative recovery procedures to minimize the total risk. We motivate the use of the tool-chain by showing an example scenario where the recovery procedure recommended to minimize security risk depends on the current state of system as well as the network topology.",
author = "Zahid Anwar and Ravinder Shankesi and Campbell, {R H}",
year = "2008",
month = "10",
day = "13",
doi = "10.1109/DSN.2008.4630105",
language = "English (US)",
pages = "366--375",
note = "2008 International Conference on Dependable Systems and Networks, DSN-2008 ; Conference date: 24-06-2008 Through 27-06-2008",

}

TY - CONF

T1 - Automatic security assessment of critical cyber-infrastructures

AU - Anwar, Zahid

AU - Shankesi, Ravinder

AU - Campbell, R H

PY - 2008/10/13

Y1 - 2008/10/13

N2 - This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We describe a network model representing the static elements of a cyberinfrastructure including devices, services, network connectivity, vulnerabilities, and access controls. The dynamic elements include workflow models of the operating procedures, processes and the state of a working power grid. We introduce a toolkit that with a little manual assistance can automatically generate these models from specifications, continuously update attributes from online event aggregators, and perform security assessment. The assessment reveals whether observed anomalies about the system could indicate possible security problems and permit dynamic ranking of alternative recovery procedures to minimize the total risk. We motivate the use of the tool-chain by showing an example scenario where the recovery procedure recommended to minimize security risk depends on the current state of system as well as the network topology.

AB - This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We describe a network model representing the static elements of a cyberinfrastructure including devices, services, network connectivity, vulnerabilities, and access controls. The dynamic elements include workflow models of the operating procedures, processes and the state of a working power grid. We introduce a toolkit that with a little manual assistance can automatically generate these models from specifications, continuously update attributes from online event aggregators, and perform security assessment. The assessment reveals whether observed anomalies about the system could indicate possible security problems and permit dynamic ranking of alternative recovery procedures to minimize the total risk. We motivate the use of the tool-chain by showing an example scenario where the recovery procedure recommended to minimize security risk depends on the current state of system as well as the network topology.

UR - http://www.scopus.com/inward/record.url?scp=53349174368&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=53349174368&partnerID=8YFLogxK

U2 - 10.1109/DSN.2008.4630105

DO - 10.1109/DSN.2008.4630105

M3 - Paper

AN - SCOPUS:53349174368

SP - 366

EP - 375

ER -